[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Apache 1.3.1 Released! (fwd)
- To: tech_(_at_)_openbsd_(_dot_)_org
- Subject: Apache 1.3.1 Released! (fwd)
- From: Michael Shalayeff <mickey_(_at_)_lucifier_(_dot_)_dial-up_(_dot_)_user_(_dot_)_akula_(_dot_)_net>
- Date: Thu, 23 Jul 1998 11:54:13 -0400 (EDT)
----- Forwarded message from Brian Behlendorf -----
The Apache Group is pleased to announce the release of version 1.3.1
of the Apache HTTP server.
The changes in this release consist of UNIX portability fixes, Win32
security issues, and assorted other minor features or fixes.
WE URGE ALL USERS RUNNING ANY PREVIOUS VERSION OF APACHE ON WIN32
TO UPGRADE IMMEDIATELY.
Users on other platforms should review the CHANGES file and decide
on their upgrade plans; the security issues apply only to Apache
on Win32. We consider Apache 1.3.1 to be the most stable version
of Apache available.
Apache 1.3.1 is available for download from
Please see the CHANGES file in the same directory for a full list of
changes. The distribution is also available via any of the mirrors
For an overview of new features in 1.3 please see
In general, Apache 1.3 offers several substantial improvements
over version 1.2, including better performance, reliability
and a wider-range of supported platforms, including Windows 95 and
NT (which both fall under the "Win32" label).
Apache is the most popular web-server in the known universe; over
half of the servers on the Internet are running Apache or one of its
IMPORTANT NOTE FOR WIN32 USERS: Over the years, many users have
come to trust Apache as a secure and stable server. It must
be realized that the current Win32 code has not yet reached these
levels and should still be considered to be of beta quality. Any
Win32 stability or security problems do not impact, in any way,
Apache on other platforms. With the continued donation of time
and resources by individuals and companies, we hope that the Win32
version of Apache will grow stronger through the 1.3.x release
Versions of Apache on Win32 prior to version 1.3.1 are vulnerable
to a number of security holes common to several Win32 servers.
The problems that impact Apache include:
- trailing "."s are ignored by the file system. This allowed
certain types of access restrictions to be bypassed.
- directory names of three or more dots (eg. "...") are
considered to be valid similar to "..". This allowed people
to gain access to files outside of the configured document
There have been at least four other similar instances of the same
basic problem: on Win32, there is more than one name for a file.
Some of these names are poorly documented or undocumented, and even
Microsoft's own IIS has been vulnerable to many of these problems.
This behavior of the Win32 file system and API makes it very difficult
to insure future security; problems of this type have been known
about for years, however each specific instance has been discovered
individually. It is unknown if there are other, yet unpublicized,
filename variants. As a result, we recommend that you use extreme
caution when dealing with access restrictions on all Win32 web
----- End of forwarded message from Brian Behlendorf -----
Visit your host, monkey.org